Category: EN

USENIX Security ’23 – ‘Tubes Among Us: Analog Attack on Automatic Speaker Identification’

Authors/Presenters: Shimaa Ahmed, Yash Wani, Ali Shahin Shamsabadi, Mohammad Yaghin, Ilia Shumailov, Nicolas Papernot, Kassem Fawaz Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the…

Imperva defends customers against recent vulnerabilities in Apache OFBiz

On December 26, researchers from SonicWall Capture Labs discovered an authentication bypass vulnerability in Apache OFBiz, tracked as CVE-2023-51467. This bug has a CVSS score of 9.8 and allows attackers to achieve server-side request forgery (SSRF) by bypassing the program’s…

In the Trenches of Broadband Policy: 2023 Year In Review

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> EFF has long advocated for affordable, accessible, future-proof internet access for all. Nearly 80% of Americans already consider internet access to be as essential as water and…

Fighting For Your Digital Rights Across the Country: Year in Review 2023

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> EFF works every year to improve policy in ways that protect your digital rights in states across the country. Thanks to the messages of hundreds of EFF members across the country,…

First, Let’s Talk About Consumer Privacy: 2023 Year in Review

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> Whatever online harms you want to alleviate on the internet today, you can do it better—with a broader impact—if you enact strong consumer data privacy legislation first.…

Malware Leveraging Google Cookie Exploit via OAuth2 Functionality

By Deeba Ahmed Among others, developers of the infamous Lumma, an infostealer malware, are already using the exploit by employing advanced… This is a post from HackRead.com Read the original post: Malware Leveraging Google Cookie Exploit via OAuth2 Functionality This…

Five Ways the Internet Became More Dangerous in 2023

The emergence of cyber dangers presents a serious threat to people, companies, and governments globally at a time when technical breakthroughs are the norm. The need to strengthen our digital defenses against an increasing flood of cyberattacks is highlighted by…

Microsoft disables feature after abuse by threat actors

Application developers relying on Windows’ App Installer feature for distributing software over the web will have to find another vehicle, after Microsoft disabled a key protocol because it is being abused by threat actors. Microsoft said Thursday it has disabled…

Key Aspects of API Evolution: Version Control in Multi-Environments With API7 Enterprise

In the rapidly evolving landscape of software systems in today’s digital era, API version control has emerged as a critical strategy to ensure the robust evolution of systems. Particularly in multi-environment scenarios, effective management and tracking of API changes become…

Getting the Board on Board: Explaining Cybersecurity ROI

Despite increasing data breaches, ransomware attacks, and assorted cyber threats, convincing the Board of Directors to invest in robust cybersecurity isn’t always easy for many businesses. The challenge originates mainly from the need to demonstrate a quantifiable Return On Investment…

Facebook Is Still Making Billions In Ad Revenue From Kids’ Data

The post Facebook Is Still Making Billions In Ad Revenue From Kids’ Data appeared first on Facecrooks. Earlier this year, dozens of states sued Facebook for allegedly harming young users and putting profit above their safety. However, the extent to…

Billion times emptiness

By Max Ammann Behind Ethereum’s powerful blockchain technology lies a lesser-known challenge that blockchain developers face: the intricacies of writing robust Ethereum ABI (Application Binary Interface) parsers. Ethereum’s ABI is critical to the blockchain’s infrastructure, enabling seamless interactions between smart…

USENIX Security ’23 – Xinghui Wu, Shiqing Ma, Chao Shen, Chenhao Lin, Qian Wang, Qi Li, Yuan Rao ‘KENKU: Towards Efficient And Stealthy Black-box Adversarial Attacks Against ASR Systems’

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel. Permalink The post…

China arrests 4 people who developed ChatGPT based ransomware

Microsoft-owned ChatGPT, developed by OpenAI, remains officially inaccessible in China. However, an intriguing turn of events reveals that hackers within the country have managed to exploit the service through VPNs. These cyber criminals successfully deployed ransomware, encrypting servers within a…

Russia-linked APT28 used new malware in a recent phishing campaign

Ukraine’s CERT (CERT-UA) warned of a new phishing campaign by the APT28 group to deploy previously undocumented malware strains. The Computer Emergency Response Team of Ukraine (CERT-UA) warned of a new cyber espionage campaign carried out by the Russia-linked group…

Three Ways Smart Devices Can Compromise Your Privacy

  Any gadget that has an internet connection and can be operated by a computer or smartphone is considered a smart device. Home appliances, security cameras, thermostats, doorbells, lighting systems, and other networked gadgets are examples of such devices.  Smart…

Cullman County Courthouse Hit by Ransomware

A hostile cyberattack recently affected the Cullman County Courthouse, causing disruptions to regular operations and causing shockwaves throughout the community. The ransomware attack that affected the courthouse’s systems had serious repercussions for Cullman County residents as well as the local…

Hackers Stole Cryptocurrency Worth $2 Billion in Year 2023

For another year, crypto-stealing cases made headlines. However, as per crypto security firms, this was the first time since 2020, that the trend has been declining.  Based on dozens of cyberattacks and thefts this year, hackers stole over $2 billion…

From DarkGate to AsyncRAT: Malware Detected and Shared As Unit 42 Timely Threat Intelligence

From October-December, the activities of DarkGate, Pikabot, IcedID and more were seen and shared with the broader community via social media The post From DarkGate to AsyncRAT: Malware Detected and Shared As Unit 42 Timely Threat Intelligence appeared first on…

Best of 2023: Combo Lists & the Dark Web: Understanding Leaked Credentials

In today’s interconnected, cloud-based world, user credentials are the keys that grant entry to the house that stores an organization’s digital treasure. Just as burglars pick the lock on a physical house, cybercriminals use stolen credentials to gain unauthorized access…

Albanian Parliament and One Albania Telecom Hit by Cyber Attacks

The Assembly of the Republic of Albania and telecom company One Albania have been targeted by cyber attacks, the country’s National Authority for Electronic Certification and Cyber Security (AKCESK) revealed this week. “These infrastructures, under the legislation in force, are…

In Other News: Ubisoft Hack, NASA Security Guidance, TikTok Requests iPhone Passcode

Noteworthy stories that might have slipped under the radar: Ubisoft investigating alleged hack, NASA releases security guidance, TikTok scares iPhone users.  The post In Other News: Ubisoft Hack, NASA Security Guidance, TikTok Requests iPhone Passcode appeared first on SecurityWeek. This…

Financially motivated threat actors misusing App Installer

Since mid-November 2023, Microsoft Threat Intelligence has observed threat actors, including financially motivated actors like Storm-0569, Storm-1113, Sangria Tempest, and Storm-1674, utilizing the ms-appinstaller URI scheme (App Installer) to distribute malware. The post Financially motivated threat actors misusing App Installer…

Twitter/X Fails To Block Content Moderation Disclosure Law In California

Elon Musk’s X loses bid to block California law that requires social media to publicly disclose their content moderation practices This article has been indexed from Silicon UK Read the original article: Twitter/X Fails To Block Content Moderation Disclosure Law…

Lockbit Ransomware Attack Affects Three German Hospitals

Katholische Hospitalvereinigung Ostwestfalen (KHO), a German hospital network, has confirmed that a cyberattack launched by the Lockbit ransomware group is the cause of recent service disruptions at three hospitals in its network. The attack occurred in the early morning of…

Cyber Security Today, Dec. 29, 2023 – Get cracking on your cybersecurity strategic plan

Don’t have a cybersecurity strategic plan? Here’s how to start bu This article has been indexed from IT World Canada Read the original article: Cyber Security Today, Dec. 29, 2023 – Get cracking on your cybersecurity strategic plan

iPhone Spyware Exploits Obscure Chip Feature, Targets Researchers

By Deeba Ahmed Triangulation of Terror: Inside the Most Sophisticated iPhone Spyware Campaign Ever Seen. This is a post from HackRead.com Read the original post: iPhone Spyware Exploits Obscure Chip Feature, Targets Researchers This article has been indexed from Hackread…

New Medusa Stealer Attacking Users to Steal Login Credentials

While the world celebrated Christmas, the cybercrime underworld feasted on a different kind of treat: the release of Meduza 2.2, a significantly upgraded password stealer poised to wreak havoc on unsuspecting victims.  Cybersecurity researchers at Resecurity uncovered the details of…

Pentagon Wants Feedback on Revised Cybersecurity Maturity Model Certification Program

DoD is requesting public opinion on proposed changes to the Cybersecurity Maturity Model Certification program rules. The post Pentagon Wants Feedback on Revised Cybersecurity Maturity Model Certification Program appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS…

CERT-UA Uncovers New Malware Wave Distributing OCEANMAP, MASEPIE, STEELHOOK

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new phishing campaign orchestrated by the Russia-linked APT28 group to deploy previously undocumented malware such as OCEANMAP, MASEPIE, and STEELHOOK to harvest sensitive information. The activity, which was detected by the agency between December…

Its Groundhog Day at Microsoft! Vulnerability patched again

Remember the movie Groundhog Day? Bull Murray plays a rather self-centered weatherman who finds himself in a time loop on Groundhog Day. Windows administrators may have similar feelings to Murray’s in regards […] Thank you for being a Ghacks reader.…

Europe’s Largest Parking App Provider Informs Customers of Data Breach

EasyPark says hackers stole European customer information, including partial IBAN or payment card numbers.  The post Europe’s Largest Parking App Provider Informs Customers of Data Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read…

Critical Apache OFBiz Vulnerability in Attacker Crosshairs

Shadowserver sees possible in-the-wild exploitation of a critical Apache OFBiz vulnerability tracked as CVE-2023-49070. The post Critical Apache OFBiz Vulnerability in Attacker Crosshairs appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original article:…

Operations, Trading of Eagers Automotive Disrupted by Cyberattack

Eagers Automotive, a vehicle dealer in Australia and New Zealand, has halted trading after being targeted in a cyberattack. The post Operations, Trading of Eagers Automotive Disrupted by Cyberattack appeared first on SecurityWeek. This article has been indexed from SecurityWeek…

Digital Battlefields: Artists Employ Technological Arsenal to Combat AI Copycats

  Technology is always evolving, and the art field has been on the frontline of a new battle as a result – the war against artificial intelligence copycats. In the fast-paced world of artificial intelligence, it is becoming more and…

Develop Valuable Security and Risk Management Skills for Just $30 Through 1/1

With cyberthreats and cyberattacks always on the rise, developing security and risk management skills could be one of the best moves for your business or career. This article has been indexed from Security | TechRepublic Read the original article: Develop…

New Version of Meduza Stealer Released in Dark Web

The Resecurity’s HUNTER unit spotted a new version of the Meduza stealer (version (2.2)) that was released in the dark web. On Christmas Eve, Resecurity’s HUNTER unit spotted the author of perspective password stealer Meduza has released a new version…

Kimsuky Hackers Deploying AppleSeed, Meterpreter, and TinyNuke in Latest Attacks

Nation-state actors affiliated to North Korea have been observed using spear-phishing attacks to deliver an assortment of backdoors and tools such as AppleSeed, Meterpreter, and TinyNuke to seize control of compromised machines. South Korea-based cybersecurity company AhnLab attributed the activity…

Indian IT Leaders Identify Security Gap in Data Policies

A recent study by Rubrik, a US-based data security firm, has bare concerning reality within the Indian IT sector: an alarming 49% of IT leaders feel that security remains a glaring omission within their organization’s data policies. This discovery sheds…

Microsoft Disables MSIX App Installer Protocol Widely Used in Malware Attacks

Microsoft on Thursday said it’s once again disabling the ms-appinstaller protocol handler by default following its abuse by multiple threat actors to distribute malware. “The observed threat actor activity abuses the current implementation of the ms-appinstaller protocol handler as an access vector…

Beware of this Instagram trend that compromise Data Privacy

In today’s modern era, the concept of privacy in our daily lives seems elusive, given the widespread sharing of personal details on various social media platforms. From Facebook and Instagram to WhatsApp, Twitter, and even the notorious Telegram, users often…

Navigating Cloud Security: A Comparative Analysis of IaaS, PaaS, and SaaS

In the era of digital transformation, businesses are increasingly leveraging cloud computing services to enhance agility, scalability, and efficiency. However, the paramount concern for organizations considering a move to the cloud is the security of their data and operations. This…

Why you need to extend enterprise IT security to the mainframe

Organizations with mainframes face a unique challenge: extending consistency across the entire enterprise, including mainframe environments. The ongoing issue lies in the incompatibility of tools designed for both mainframes and enterprise settings, resulting in disparate solutions, training methods, and user…

API security in 2024: Predictions and trends

As technology continues to advance at an unprecedented pace, so does the complexity of API (application programming interface) security. With the proliferation of APIs in modern applications and services, organizations will need to develop a better understanding of their API…

AI software market to hit $307 billion by 2027

The worldwide revenue for AI software will reach $307 billion in 2027, according to IDC. The forecast for AI-centric software includes Artificial Intelligence Platforms, AI Applications, AI System Infrastructure Software (SIS), and AI Application Development and Deployment (AD&D) software (excluding…

Tech upgrades for first responders are a necessity, not a luxury

Public safety professionals want technology upgrades and adoption of federal standards for first responder IT security, reporting and efficiency, according to Mark43. “We heard a resounding response from first responders across the country: They are concerned about their public safety…

Privacy Education for Students: A Vital Curriculum Component

In today’s digital age, where personal information is constantly being shared and collected, privacy has emerged as a critical concern for individuals of all ages…. The post Privacy Education for Students: A Vital Curriculum Component appeared first on Security Zap.…

Why attackers love to target misconfigured clouds and phones

Unencrypted identity data stored in unsecured or misconfigured clouds is an attackers’ goldmine. This article has been indexed from Security News | VentureBeat Read the original article: Why attackers love to target misconfigured clouds and phones

Operation Triangulation attacks relied on an undocumented hardware feature

Experts discovered that Operation Triangulation targeting Apple iOS devices leveraged an undocumented hardware feature. Researchers from the Russian cybersecurity firm Kaspersky discovered that threat actors behind the Operation Triangulation exploited an undocumented hardware feature to target Apple iOS devices. In early June,…

Man Sues Facebook For Not Deactivating Deceased Veteran’s Account Used In Crypto Scam

The post Man Sues Facebook For Not Deactivating Deceased Veteran’s Account Used In Crypto Scam appeared first on Facecrooks. Scammers will do anything to make a quick buck on Facebook — even taking over the account of a deceased Army…

Exploring Imgly SDK Alternatives for Ultimate Flexibility

By Owais Sultan Imgly SDK has been a popular choice for developers seeking reliable image processing and manipulation solutions. However, in… This is a post from HackRead.com Read the original post: Exploring Imgly SDK Alternatives for Ultimate Flexibility This article…

Daniel Stori’s ‘Distributed Architecture Drama’

<a class=” sqs-block-image-link ” href=”https://turnoff.us/geek/distributed-architecture-drama/”> <img alt=”” height=”844″ src=”https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/9d42ceb2-21f3-47d1-beed-222ba7bdd0b9/image-asset.png?format=1000w” width=”925″ /> </a><figcaption class=”image-caption-wrapper”> via the webcomic talent of the inimitable Daniel Stori at Turnoff.US Permalink The post Daniel Stori’s ‘Distributed Architecture Drama’ appeared first on Security Boulevard. This article has…

USENIX Security ’23 – Xiaojun Xu, Qingying Hao, Zhuolin Yang, Bo Li, David Liebovitz, Gang Wang, Carl A. Gunter ‘How to Cover up Anomalous Accesses to Electronic Health Records’

Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel. Permalink The post…

Navigating the MSP Ecosystem in 2024: The Trifecta of Success – Leadership, Empathy, and Execution

As the curtains draw close on another tech-filled year, let’s take a delightful detour into the whimsical world of MSPs (Managed Service Providers), The post Navigating the MSP Ecosystem in 2024: The Trifecta of Success – Leadership, Empathy, and Execution…

LABScon Replay | Spectre Strikes Again: Introducing the Firmware Edition

Binarly’s CEO Alex Matrosov dives deep into the fascinating world of speculative attacks against System Management Mode (SMM) on AMD-based devices. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on…

How To Use Artificial Intelligence to Optimize DevOps

DevOps and AI make an inseparable pair and impact businesses of all kinds. While DevOps enables speedy product development and easier maintenance of existing deployments, AI transforms the overall system functionality. The DevOps team can rely on artificial intelligence and…

Cyberattack Targets Albanian Parliament’s Data System, Halting Its Work

Albania’s Parliament said it had suffered a cyberattack with hackers trying to get into its data system, resulting in a temporary halt in its services. The post Cyberattack Targets Albanian Parliament’s Data System, Halting Its Work appeared first on SecurityWeek.…

Cybercriminals launched “Leaksmas” event in the Dark Web exposing massive volumes of leaked PII and compromised data

Leaksmas: On Christmas Eve, multiple threat actors released substantial data leaks, Resecurity experts reported. On Christmas Eve, Resecurity protecting Fortune 100 and government agencies globally, observed multiple actors on the Dark Web releasing substantial data leaks. Over 50 million records…

Unveiling the Power of Helidon 4: A Dive Into New Features

In the ever-evolving landscape of microservices development, Helidon has emerged as a beacon of innovation. The release of Helidon 4 brings forth a wave of enhancements and features that promise to redefine the way developers approach microservices architecture. In this…

Government Advises Social Media Platforms on IT Rule Compliance Amid Deepfake Concerns

  In response to escalating concerns surrounding the rise of deepfakes and misinformation fueled by artificial intelligence (AI), the government has issued a directive for all platforms to adhere to IT rules, as outlined in an official release.  The advisory…

Microsoft addresses App Installer abuse

Summary In recent months, Microsoft Threat Intelligence has observed threat actors leveraging social engineering and phishing techniques to target Windows OS users and utilizing the ms-appinstaller URI scheme. We have addressed and mitigated this malicious activity by turning off ms-appinstaller…

Guardians of Tomorrow: Arkose Labs Shares the Top 3 Cyber Threats for 2024

If you missed our recent webinar, “Foreseeing the Future Threatscape: 2024’s Bad Actor Forecast,” there’s still time to catch up on expert attack insights for next year. Hosted by top executives at Arkose Labs, including CCO Patrice Boffa, CFO Frank…

A tale of 2 casino ransomware attacks: One paid out, one did not

What can be learned from MGM’s and Caesars’ infosec moves Feature  The same cybercrime crew broke into two high-profile Las Vegas casino networks over the summer, infected both with ransomware, and stole data belonging to tens of thousands of customers…

Palo Alto Networks Completes Acquisition of Talon

Palo Alto Networks completed the acquisition of Talon Cyber Security, an Israeli startup selling a secure browser technology to enterprise customers. The post Palo Alto Networks Completes Acquisition of Talon appeared first on SecurityWeek. This article has been indexed from…

Lockbit ransomware attack interrupted medical emergencies gang at a German hospital network

A Lockbit ransomware attack against the German hospital network Katholische Hospitalvereinigung Ostwestfalen (KHO) caused service disruptions at three hospitals. German hospital network Katholische Hospitalvereinigung Ostwestfalen (KHO) announced it has suffered service disruptions at three hospitals (Bielefeld, Rheda-Wiedenbrück, and Herford) after…

USENIX Security ’23 – Rethinking System Audit Architectures for High Event Coverage and Synchronous Log Availability

Authors/Presenters: Varun Gandhi, Sarbartha Banerjee, Aniket Agrawal, Adil Ahmad, Sangho Lee, Marcus Peinado Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated…

USENIX Security ’23 – ‘Squint Hard Enough: Attacking Perceptual Hashing With Adversarial Machine Learning’

Jonathan Prokos, Neil Fendley, Matthew Green, Roei Schuster, Eran Tromer, Tushar Jois, Yinzhi Cao Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events…

Trending Ransomware news headlines on Google

During the holiday season of Christmas 2023, a ransomware attack targeted the Ohio Lottery, causing disruptions to its operations. The gaming company is currently in the process of recovering its encrypted data and is consulting with security experts to expedite…

The Atlas of Surveillance Hits Major Milestones: 2023 in Review

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> “The EFF are relentless.” That’s what a New York Police Department lieutenant wrote on LinkedIn after someone sent him a link to the Atlas of Surveillance, EFF’s…

Kids Online Safety Shouldn’t Require Massive Online Censorship and Surveillance: Year in Review 2023

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> There’s been plenty of bad news regarding federal legislation in 2023. For starters, Congress has failed to pass meaningful comprehensive data privacy reforms. Instead, legislators have spent…

Protecting Students from Faulty Software and Legislation: 2023 Year in Review

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> Lawmakers, schools districts, educational technology companies and others keep rolling out legislation and software that threatens students’ privacy, free speech, and access to social media, in the name of…

Kaspersky reveals previously unknown hardware ‘feature’ used in iPhone attacks

‘This is no ordinary vulnerability’ sec pros explain Kaspersky’s Global Research and Analysis Team (GReAT) has exposed a previously unknown ‘feature’ in Apple iPhones that allows attackers to bypass hardware-based memory protection.… This article has been indexed from The Register…

NSA iPhone Backdoor? Apple Avoids Russian Blame Game

“No Ordinary Vulnerability” — Operation Triangulation research uncovers new details of fantastic attack chain. The post NSA iPhone Backdoor? Apple Avoids Russian Blame Game appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original…